DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
bc890b6b0126618516668f2b660f1240.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc890b6b0126618516668f2b660f1240.dll
Resource
win10v2004-20240226-en
Target
bc890b6b0126618516668f2b660f1240
Size
140KB
MD5
bc890b6b0126618516668f2b660f1240
SHA1
f8e9dbc4b035b12740128000d4f3ea82857a0e07
SHA256
7632078d3e109c4408925a8724ab3989653b859c16a9226eeaa468ed0941ca9a
SHA512
4561c931647e5f7d53cd0e0c0fdb071dfdc362fdc6655d38919623d3a771401515036f0b174d1e6663d77c66bb1e3eed0611b0043e27474e3c42d9279fc5097a
SSDEEP
3072:TM8qdCY+QAylj1xYT9BD5zJzoZKwnjCeiky:okyhY7t2cwnjCxky
Checks for missing Authenticode signature.
resource |
---|
bc890b6b0126618516668f2b660f1240 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE